The Hacking Lab (@thehackinglab) 's Twitter Profile
The Hacking Lab

@thehackinglab

Online Cyber Security Lab

ID: 835220414

linkhttps://www.hacking-lab.com/ calendar_today20-09-2012 09:58:50

964 Tweet

2,2K Followers

86 Following

Compass Security (@compasssecurity) 's Twitter Profile Photo

How can I become a Red Team Operator? – Yours sincerely, A recent graduate. We break down what it takes and why there's no shortcut, and why pentesting is the place to start: blog.compass-security.com/2025/04/i-wann… #redteam #infosec #pentest #career

How can I become a Red Team Operator? – Yours sincerely, A recent graduate.

We break down what it takes and why there's no shortcut, and why pentesting is the place to start:  blog.compass-security.com/2025/04/i-wann…

#redteam #infosec #pentest #career
Compass Security (@compasssecurity) 's Twitter Profile Photo

Security analysts Stephan Sekula and Dennis Henke identified vulnerabilities in Ibexa DXP CMS: compass-security.com/en/news/detail…

Compass Security (@compasssecurity) 's Twitter Profile Photo

3 milliseconds to admin — Our analyst John Ostrowski turned a DLL hijacking into a reliable local privilege escalation on Windows 11. He chained opportunistic locks, and API hooking to win the race to CVE-2025-24076 & CVE-2025-24994. Read his blog post: blog.compass-security.com/2025/04/3-mill…

3 milliseconds to admin — Our analyst John Ostrowski turned a DLL hijacking into a reliable local privilege escalation on Windows 11. He chained opportunistic locks, and API hooking to win the race to CVE-2025-24076 & CVE-2025-24994. Read his blog post: blog.compass-security.com/2025/04/3-mill…
Compass Security (@compasssecurity) 's Twitter Profile Photo

Tired of sifting through Entra ID manually? EntraFalcon is a PowerShell tool that flags risky objects configs & privileged role assignments with ⚡ Scoring model 📊 HTML reports 🔒 No Graph API consent hassle. Get it now: blog.compass-security.com/2025/04/introd… #EntraID #IAM

Tired of sifting through Entra ID manually? EntraFalcon is a PowerShell tool that flags risky objects configs & privileged role assignments with ⚡ Scoring model 📊 HTML reports 🔒 No Graph API consent hassle. Get it now: blog.compass-security.com/2025/04/introd…
#EntraID #IAM
Compass Security (@compasssecurity) 's Twitter Profile Photo

In his latest blog post, Marc Tanner Marc André Tanner shows how to bypass BitLocker using BitPixie (CVE-2023-21563) and signed Microsoft components only. Check out the blog post for a PoC and a demo. #BitLocker #redteam blog.compass-security.com/2025/05/bypass…

In his latest blog post, Marc Tanner <a href="/marcandretanner/">Marc André Tanner</a>  shows how to bypass BitLocker using BitPixie (CVE-2023-21563) and signed Microsoft components only. Check out the blog post for a PoC and a demo. #BitLocker #redteam 

blog.compass-security.com/2025/05/bypass…
Compass Security (@compasssecurity) 's Twitter Profile Photo

Many CI/CD tools promise to keep your dependencies up to date - but if misconfigured, they can expose your organization. From token leaks to MR hijacks, Jan Friedli's latest blog post shows how bad configuration can turn a security tool into an attack vector. 🛠️💣

Many CI/CD tools promise to keep your dependencies up to date - but if misconfigured, they can expose your organization. From token leaks to MR hijacks, Jan Friedli's latest blog post shows how bad configuration can turn a security tool into an attack vector. 🛠️💣
Compass Security (@compasssecurity) 's Twitter Profile Photo

Primate traits run deep at Teleboy: smart, curious, and always evolving. If that sounds like you, take on the challenge. Test the boundaries of a telco-turned-tech player and help secure streaming, internet, and phone experience of 400,000+ users. #bugbounty #ethicalhacking

Primate traits run deep at <a href="/TeleboyCH/">Teleboy</a>: smart, curious, and always evolving. If that sounds like you, take on the challenge. Test the boundaries of a telco-turned-tech player and help secure streaming, internet, and phone experience of 400,000+ users. #bugbounty #ethicalhacking
Compass Security (@compasssecurity) 's Twitter Profile Photo

LLM-based vuln hunting just leveled up with xvulnhuntr - a fork of vulnhuntr with support for: C#, Java, Go. Read Nicolò Fornari's blog post and go grab the project on GitHub. blog.compass-security.com/2025/07/xvulnh…

LLM-based vuln hunting just leveled up with xvulnhuntr - a fork of vulnhuntr with support for: C#, Java, Go. Read <a href="/rationalpsyche/">Nicolò Fornari</a>'s blog post and go grab the project on GitHub.
blog.compass-security.com/2025/07/xvulnh…
Compass Security (@compasssecurity) 's Twitter Profile Photo

Passwords are dead, long live passkeys! 🔑 In our latest blog, we go hands-on: real-life setups, plus tips for recovery and avoiding pitfalls. blog.compass-security.com/2025/08/into-t… #Passkeys #CyberSecurity #Authentication

Passwords are dead, long live passkeys! 🔑

In our latest blog, we go hands-on: real-life setups, plus tips for recovery and avoiding pitfalls.

blog.compass-security.com/2025/08/into-t…

#Passkeys #CyberSecurity #Authentication
Compass Security (@compasssecurity) 's Twitter Profile Photo

Calling all bug hunters! schulNetz by Centerboard AG is now in scope! Help protect over 100k users in schools. Are you ready to make the grade and earn bounties? Program: bugbounty.compass-security.com/bug-bounties/c… #bugbounty

Calling all bug hunters! schulNetz by Centerboard AG is now in scope! Help protect over 100k users in schools. Are you ready to make the grade and earn bounties? Program: bugbounty.compass-security.com/bug-bounties/c… #bugbounty
Compass Security (@compasssecurity) 's Twitter Profile Photo

Kerberos powers auth in Windows and hides big security risks. We’re launching a 6-part deep dive: from protocol basics to attacks plus how to stop them. Starts today → blog.compass-security.com/2025/09/taming… → Subscribe to our channel! #Kerberos #ActiveDirectory

Kerberos powers auth in Windows and hides big security risks. We’re launching a 6-part deep dive: from protocol basics to attacks plus how to stop them.

Starts today → blog.compass-security.com/2025/09/taming… → Subscribe to our channel!

#Kerberos #ActiveDirectory
Compass Security (@compasssecurity) 's Twitter Profile Photo

Episode 2 of our Kerberos deep dive is live. Kerberoasting lets attackers steal AD service account credentials. See how it works and how to protect your systems: youtu.be/PhNspeJ0r-4?fe… #Kerberos #ActiveDirectory

Compass Security (@compasssecurity) 's Twitter Profile Photo

We use James Kettle’s (James Kettle) Burp extension Collaborator Everywhere daily. Now our upgrades are in v2: customizable payloads, storage, visibility. Perfect for OOB bugs like SSRF. Find out more here: blog.compass-security.com/2025/09/collab… #AppSec #BurpSuite #Pentesting

We use James Kettle’s (<a href="/albinowax/">James Kettle</a>) Burp extension Collaborator Everywhere daily. Now our upgrades are in v2: customizable payloads, storage, visibility. Perfect for OOB bugs like SSRF.

Find out more here:  blog.compass-security.com/2025/09/collab…

#AppSec #BurpSuite #Pentesting
Compass Security (@compasssecurity) 's Twitter Profile Photo

Episode 3 of our Kerberos deep dive is live. AS-REP Roasting abuses accounts without pre-auth. Learn the risks, how attackers exploit it, and how to defend. youtu.be/56BjmyOTN5o?fe… #Kerberos #ActiveDirectory

Compass Security (@compasssecurity) 's Twitter Profile Photo

Episode 4 of our Kerberos deep dive is live. Unconstrained delegation can expose critical credentials. Learn how attackers abuse it. And how to lock down your systems. youtu.be/_6FYZRTJQ-s?fe… #Kerberos #ActiveDirectory

Compass Security (@compasssecurity) 's Twitter Profile Photo

Episode 5 of our Kerberos deep dive is live. Constrained delegation isn’t bulletproof. See how attackers exploit it, and how to defend with monitoring & best practices. youtu.be/rnhr02eKU0I?si… #Kerberos #ActiveDirectory

Compass Security (@compasssecurity) 's Twitter Profile Photo

The final episode of our Kerberos deep dive is live! RBCD opens new attack paths in Kerberos. Learn how misconfigs enable privilege escalation and how to defend. youtu.be/l97RDnzdrXY?fe… #Kerberos #ActiveDirectory

Compass Security (@compasssecurity) 's Twitter Profile Photo

NIS2 means stricter rules and steep fines. Penetration testing is key to proving compliance & improving security, uncovering flaws before attackers do. Our latest blog explains why you need it now: blog.compass-security.com/2025/09/ensuri… #CyberSecurity #NIS2 #Pentesting

NIS2 means stricter rules and steep fines.

Penetration testing is key to proving compliance &amp; improving security, uncovering flaws before attackers do.

Our latest blog explains why you need it now: blog.compass-security.com/2025/09/ensuri… 

#CyberSecurity #NIS2 #Pentesting
Compass Security (@compasssecurity) 's Twitter Profile Photo

The leaked LockBit chats give a rare inside look at ransomware ops. Read our blog for an analysis and lessons for defenders: blog.compass-security.com/2025/10/lockbi… #CyberSecurity #Ransomware #LockBit

The leaked LockBit chats give a rare inside look at ransomware ops.

Read our blog for an analysis and lessons for defenders: blog.compass-security.com/2025/10/lockbi…

#CyberSecurity #Ransomware #LockBit
Compass Security (@compasssecurity) 's Twitter Profile Photo

Learn about a FortiProxy Domain Fronting Protection bypass discovered by our analyst @[email protected] . Details in the advisory: compass-security.com/en/news/detail… Curious how web filters are evaded? Read his blog series: blog.compass-security.com/2025/03/bypass… #cve #pentest #bypass